2006
DOI: 10.1108/09685220610670378
|View full text |Cite
|
Sign up to set email alerts
|

Formulating information systems risk management strategies through cultural theory

Abstract: Purpose -The purpose of this paper is to examine the potential of cultural theory as a tool for identifying patterns in the stakeholders' perception of risk and its effect on information system (IS) risk management. Design/methodology/approach -Risk management involves a number of human activities which are based on the way the various stakeholders perceive risk associated with IS assets. Cultural theory claims that risk perception within social groups and structures is predictable according to group and indiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(22 citation statements)
references
References 36 publications
0
22
0
Order By: Relevance
“…(Dourish, dl Flor & Joseph 2003) (Carstens et al 2004) (Adams, Sasse & Lunt 1997) (Werlinger et al, 2009) (Veiga & Eloff 2009) (Kraemer and Carayon, 2005) (Kraemer et al, 2009) (Knapp, Marshall & Rainer 2006) (Pattinson and Anderson, 2007) (Tsohou et al, 2006). The research most closely related to the topic is described below.…”
Section: Human and Organizational Factors Causing Vulnerabilitiesmentioning
confidence: 99%
“…(Dourish, dl Flor & Joseph 2003) (Carstens et al 2004) (Adams, Sasse & Lunt 1997) (Werlinger et al, 2009) (Veiga & Eloff 2009) (Kraemer and Carayon, 2005) (Kraemer et al, 2009) (Knapp, Marshall & Rainer 2006) (Pattinson and Anderson, 2007) (Tsohou et al, 2006). The research most closely related to the topic is described below.…”
Section: Human and Organizational Factors Causing Vulnerabilitiesmentioning
confidence: 99%
“…The theory is based on four major world views: fatalism, hierarchy, egalitarianism, and individualism. Tsohou, Karyda, Kokolakis, and Kiountouzis (2006) applied cultural theory to information system risk management. They suggested strategies for IS risk management, depending on an individual's cultural bias.…”
Section: Organizational Information Systems Security Researchmentioning
confidence: 99%
“…They are AS/NZS 4360:1999;AIRMIC, ALARM, IRM: 2002;BS 31100: 2008;BS 31100:2011 andISO 31000:2009 for generic risk; The ISO 27005:2011 was also reviewed which is specific to information security risk management. A number of risk management approaches from scholars, including Humphreys (2008), Misra et al (2007), Tsohou et al (2006), Kwok and Longley (1999), Spinellis et al (1999), Halliday et al (1996), and Baskerville (1991), were also studied and discussed. AS/NZS 4360 is a widely recognized risk management standard.…”
Section: Information Security Risk Man-agement: a Literature Reviewmentioning
confidence: 99%
“…The four stages are described in terms of information security as follows (Misra et al, 2007) (Tsohou et al, 2006). The stage of initiation aims mainly to define the context of the risk management process; to set the scope of the analysis and to establish a risk management team.…”
Section: Information Security Risk Man-agement: a Literature Reviewmentioning
confidence: 99%